Skip to content
Facebook Twitter Instagram
  • +1 (857) 445-0520
  • writehw@gmail.com
  • Home
  • How It Works
  • Reviews
  • FAQs
  • Contact Us
  • Blog
Menu
  • Home
  • How It Works
  • Reviews
  • FAQs
  • Contact Us
  • Blog
Order Now

HW8: Due 10/02

  • Pat admin
  • September 28, 2022
  • 7:47 am
  • No Comments

HW8
You should be submitted in Backboard CTEC350\ HW8:
See: Due Date in Blackboard
Chapter 8
Part1: Grade (5 points)

  1. Explain that this section describes several tools used to discover vulnerabilities on
    Windows systems. Using several tools collectively is advisable because they help you
    pinpoint problems more accurately.
  2. Explain to students that they can check the CVE and CERT Web sites to determine
    vulnerabilities for any OS.
  3. Describe NetBEUI as a fast, efficient network protocol that allows NetBIOS packets to
    be transmitted over TCP/IP.
  4. Explain that Server Message Block (SMB) is used to share files and usually runs on top
    of NetBIOS, NetBEUI, or TCP/IP.
  5. Explain the main problems of having a Web server installed on your network and provide
    some recommendations to better secure it.
  6. Explain that although IIS 6.0 (Windows Server 2003) through IIS 10.0 (Windows Server
    2016) are installed in a “secure by default” mode, previous versions left crucial holes that
    made it possible for attackers to sneak into a network.
  7. Explain that it makes sense to disable unneeded services and delete unnecessary
    applications or scripts, since they are an open invitation for attacks.
  8. Explain how filtering out unnecessary ports can protect systems from attack. Discuss
    some of the ports frequently subject to attack.
  9. Explain that like any OS, Linux can be made more secure if users are aware of its
    vulnerabilities and keep current on new releases and fixes.
    Part2: Grade (10 points)
    Technical Notes for Activities
  10. Activity 8-1: This activity requires a computer running Windows, an Internet connection,
    and a Web browser.
  11. Activity 8-2: This activity requires a computer running Windows with MBSA already
    installed (Activity 8-1), paper, and a pencil.
  12. Activity 8-3: This activity requires a Linux CD, a network connection, an Internet
    connection, paper, and a pencil.
  13. Activity 8-4: This activity requires a Linux CD, an Internet connection, and a Web
    browser.
  14. Activity 8-5: This activity requires a Linux CD, an Internet connection, and a Web
    browser.
    Part3: Grade (5 points)
    HW8
    You should be submitted in Backboard CTEC350\ HW8:
    See: Due Date in Blackboard
    Key Terms
     attack surface
     Common Internet File System (CIFS)
     domain controller
     Mandatory Access Control (MAC)
     NetBIOS Extended User Interface (NetBEUI)
     Remote Procedure Call (RPC)
     Samba
     Server Message Block (SMB)
     System Center Configuration Manager
     Systems Management Server (SMS)
     Windows Software Update Services
  • Any assignment received after the time of the class is considered late (NO EXCUSES) and is
    graded with 0% off for each class it is late
Share on facebook
Facebook
Share on google
Google+
Share on twitter
Twitter
Share on linkedin
LinkedIn
Share on pinterest
Pinterest
admin

admin

All Posts »
PrevPreviousHW7: Due 9/25
Nextcase study DUE 2/10/22Next

Leave a Reply Cancel reply

You must be logged in to post a comment.

Homework Due?

Place Your Order Today

Place Order
Providing custom academic papers covers any academic levels, paper formats, and subjects.

Courses

  • English
  • History
  • Biology
  • Literature
  • Business
  • Mathematics

Quick Links

  • Home
  • How it Works
  • Reviews
  • FAQs
  • Contact
  • Blog

Legal & Payments

IntaSend Secure Payments (PCI-DSS Compliant) Secured by IntaSend Payments

© All rights reserved

Made with ❤ by Academic Websites